You are on page 1of 45

PILIPINAS: A WEB BASED

OF PILI STORES IN

SORSOGON

A Capstone Project

Presented to the Faculty of

SORSOGON STATE COLLEGE

Bulan Campus

Bulan, Sorsogon

In Partial Fulfillment of the

Requirements for the Degree

Bachelor of Science in Information Technology

BY

RIO MARTIN G. GOLIMLIM

ANDREA GALERIA

JAN MICHAEL SALEM

JERICHO ANDAMO

DECEMBER 2020
The CAPSTONE PROJECT entitled:

PILIPINAS: A WEB BASED

OF PILI STORES IN

SORSOGON

submitted by Liza Soberano, Meg Imperial, Jane de Leon, Yen Santos has

been examined and is recommended for Oral Defense.

MARK ANTHONY D. DIPAD, MIT CAPSTONE ADVISER


Program Dean Adviser

MA.ELENA C. DEMDAM, RGC


Campus Administrator
The Faculty of the Information and Communications Technology Department,

Sorsogon State College - Bulan Campus

ACCEPTS THE CAPSTONE PROJECT entitled:

PILIPINAS: A WEB BASED

OF PILI STORES IN

SORSOGON

submitted by Liza Soberano, Meg Imperial, Jane de Leon, Yen Santos

in partial fulfillment of the requirements for the Degree of BACHELOR OF

SCIENCE in Information Technology.

PANEL MEMBER 1 PANEL MEMBER 2


Member Member

PANEL MEMBER 3 CAPSTONE ADVISER


Member Adviser

MA.ELENA C. DEMDAM, RGC


Campus Administrator

Grade: 1

Date: 1
iv
EXECUTIVE SUMMARY

This is where you will put the abstract. Write something about your paper.
TABLE OF CONTENTS v

EXECUTIVE SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv

LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii

CHAPTER

I Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Project Context . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Purpose and Descriptions . . . . . . . . . . . . . . . . . . . . . 2
1.3 Objectives of the Study . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Scope and Limitations . . . . . . . . . . . . . . . . . . . . . . . 4

II Review of Related Literature and Systems . . . . . . . . . . . . . . . 6


2.1 Web-based mapping and routing service for pedestrians . . . 6
2.2 Review of Related Literature 2 . . . . . . . . . . . . . . . . . . 7
2.2.1 Cemetery Mapping System Map Location Management 8
2.3 METHOD AND SYSTEM FOR CRAWLING, MAPPING AND
EXTRACTING INFORMATIONASSOCATED WITH A BUSINESS
USING HEURISTIC AND SEMANTIC ANALYSIS . . . . . . 8
2.4 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 9
2.5 Information Kiosk . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.6 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 10
2.7 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 10
2.8 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 10
2.9 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 10
2.10 WEB-BASED REAL ESTATE MAPPING SYSTEM . . . . . . 10

III Technical Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 11


3.1 Technicality of the Project . . . . . . . . . . . . . . . . . . . . . 11
3.2 System Requirements . . . . . . . . . . . . . . . . . . . . . . . 11

IV Methodology, Results and Discussion . . . . . . . . . . . . . . . . . . 13


4.1 Project Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 13
vi

4.2 System Analysis design approach . . . . . . . . . . . . . . . . 14


4.2.1 Requirements Specification . . . . . . . . . . . . . . . . 14
4.2.2 Requirements Analysis Subsection 1 . . . . . . . . . . 18
4.3 Development Model . . . . . . . . . . . . . . . . . . . . . . . . 18
4.4 Development Approach . . . . . . . . . . . . . . . . . . . . . . 21
4.5 Software Development . . . . . . . . . . . . . . . . . . . . . . . 21
4.6 Scheduling and Timeline of the Project . . . . . . . . . . . . . 25
4.7 Implementation Results . . . . . . . . . . . . . . . . . . . . . . 25

BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

A Elements of the ODD Protocol . . . . . . . . . . . . . . . . . . . . . . 27

B 2018 ASONAM Conference Proceedings . . . . . . . . . . . . . . . . 30

C Geocoded XML of “Metro Manila” using Google Maps Geocode API 38


LIST OF FIGURES vii

2.1 Cemetery Mapping System Map Location Management . . . . . . . 8

4.1 General view of the research’s methodology. . . . . . . . . . . . . . . 13


CHAPTER I

Introduction

Bicol Region is widely known for it’s Pili nuts that is why Bicol Region earned

its title as the Pili-Nut Capital of the Philippines in fact Bicol Region supplies

80% of the total output Volume of Pili-based food and by products and Sorsogon

Province is one of the four main province that distributes pili Based product

in the Bicol Region and also it has one of the most Pili Stalls that offers Pili

products [3].

This Project will be designed to help the locals and the tourist to locate

the Pili Stalls, how it is produced and where it is abundant. This Website will

be administered by the LGU of Sorsogon because this will be a huge help to

promote the famous and known product of the province.

1.1 Project Context

Most of the Tourist when visiting Bicol Region and even locals especially here in

Sorsogon wants to taste the famous pili products but most of them also tend to

find it hard to locate Pili stores in the province because it is a very big province

it is compose of 14 municipalities ang 541 barangays [1] so we come up with this

idea to build a website not just to locate the Pili Stores through Mapping butalso
2

show them what are the products that those stalls provide and also give them the

best stores by showing them the reviews and rating of every users that already

visited the specific stores. This Project also aims to give them the Knowledge on

how the raw and main Pili nut turns into different variations Pili of Products so

not only they can know where to look but also learns how to the product is being

processed and turns into a variety of edible and delicious delicacies.

1.2 Purpose and Descriptions

Pili-Pinas a Web Based Sorsogon’s Pili Mapping, Monitoring and Marketing is a

web based system that will help pili lovers to find the exact location of the pili

store in sorsogon as well helping the pili store to monitor the stocks and the best

seller of their product. This will benefit both pili lovers and pili store to reduce

the hustle . Other subquestions are as follows:

• Research Question 1

• Research Question 2

• Research Question 3
3

1.3 Objectives of the Study

This research aims to develop an online web based system that can be used to

promote pili products and to find the nearest pili store in Sorsogon.

Given this, the specific objectives are as follows:

• To provide information about Pili store in Sorsogon through the proposed

website including:

– Location

– Store Rating/Review

– Offered Products

• To establish possible solutions to locate the nearest pili store in sorsogon

through Mapping using Leaflet.JS.

• To design and implement online platform on production monitoring and

marketing.

• To give the user information on how the various pili producst was made

just like feeding them a tutorial.


4

1.4 Scope and Limitations

The coverage of this study is to determine the status of online marketing strategies

in luring out target consumers for business establishments to be known. This

way, the status or the respondents of the study will focus solely on local businesses

run in Sorsogon, specifically Pili-nuts p roducts. All p roducers and sellers of

Pili-nuts products will be included in this study for this is the main topic of the

researchers, as the scope strictly constrict the businesses that are locally owned.

Aspects to be looked in to will be the methods and strategies,facilities,

customer services offered, and current problem the entity is facing. In coherence

with the fast modernizing society, this study will somehow introduce system that

will be important for owners to manage and interact with consumers

Such systems will suffice those present in web, mobile, and social channels.

Thus, using this system for those who sell and produce Pili-nuts product will be

much more help for the customers to know their location or business establishment.

The proposed system also covers all respondents or consumers of Sorsogon that

are buying this product, the system will provide more information about the

business establishment of how to get there and where the location is.

The proposed system is limited only for those who sell and produce Pili-

nuts products that are located in Sorsogon. The project can be used by owner
5

or producers to register their shop or establishment for the costumers to know

where are they located. “PILI-PINAS” is a web base mapping project to help

those owners and producers to be introduce and interact with their customers.

In the final analysis the proposed system is limited only to all consumers and

respondents of Sorsogon for this is the only coverage of this project.


CHAPTER II

Review of Related Literature and Systems

This chapter presents the related literature and studies that serve as basis of

the researchers on the development of system.

2.1 Web-based mapping and routing service for pedestrians

According to Arup Banerjee, Bethesda, MD (US) In today’s world, customizable

mapping services have become a part of daily life. While the majority of services

focus on driving directions, mapping services for pedestrians are becoming more

prevalent. There are online mapping Services and handheld navigation devices

available that address pedestrian routing, but in a manner very similar to that of

driving directions. Additionally, the majority of these ser vices focus on mapping

urban environments for those concerned with navigating complex metropolitan

areas. Pedestrians on a college campus (including students, alumni, visitors,

etcetera) face the challenge of navigating campuses, lecture halls, and the Surrounding

community traditionally on foot.[?]

The present invention relates generally to providing a web-based mapping

service for pedestrians and more specifically, pedestrians on a college campus

just like what our proposed system does which provides the pili stalls location
7

in Sorsogon Province which locals and tourist and foreign can use when Visiting

the said Province.

2.2 Review of Related Literature 2

In terms of recording information the cemetery management is still using a

manual process in all of its transactions. The management had a difficulty in

looking for the files or records. Some crucial issues like security, data loss, data

storage, deceased persons records, and exact location of the deceased persons

is one of the biggest problems in using a manual system. And other problem

of the office, in terms of field guidelines they use manual map. And in terms

of information the relatives of the deceased persons had a problem in getting

information about the grave location.[2]

In order to solve the above stated problems, the management of the cemetery

together with the researchers decides to develop an information system that

will convert manual processes into a database driven application to provide the

clients a much better service and to reduce and eliminate the problems caused

by a manual processing of transactions.


8

Figure 2.1. Cemetery Mapping System Map Location Management

2.2.1 Cemetery Mapping System Map Location Management

You can see in Figure 2.1 the screenshot of the Cemetery Mapping System Map

Location Management.

2.3 METHOD AND SYSTEM FOR CRAWLING, MAPPING AND EXTRACTING

INFORMATIONASSOCATED WITH A BUSINESS USING HEURISTIC

AND SEMANTIC ANALYSIS

The invention is directed to a method and system for identifying, collecting,

analyzing, mapping and extracting relevant information, including reviews and


9

opinions, as well as corresponding attributes such as the specific reviewer identi

US 8,166,013 B2 5 fication, review date, review rating, menus, discounts, photos,

Videos and podcasts associated with a specific local business and/or a specific

kind of local business, from multiple online data sources including professional

review websites, commu nity forums and blogs, and comprises a crawling mechanism

and an analysis/mapping/extraction mechanism which oper ate in parallel.[4]

This System relates to our system in terms of course of Mapping and the

features of having the capability of a user to review and give rating to a certain

place/establish which in our case the establishment that will be rated is a Pili

Stalls.

2.4 WEB-BASED REAL ESTATE MAPPING SYSTEM

This invention is a web site system that visually presents real estate information

to a computer user by displaying a satellite image of a geographic region on the

computer’s display. Real estate properties for sale within the geographic region

are indicated on the satellite image. Various data overlays can be overlaid on the

image. The data overlays may include a tax parcel overlay; a street overlay; a

park overlay; and/or a school overlay on the satellite image. The web site system

can also display multiple listing service (MLS) information of the properties for

sale.[5]
10

Presenting the information of Real state by displaying a satellite image

of a geographic region on the computer’s display is one of the features of our

system it displays the location of the Pili Stalls as well as their Information like

their name, ratings and products so this system literally has some relation in

our system and studies.

2.5 Information Kiosk

An information kiosk is disclosed which provides inter active operation with an

unfamiliar user. A video display provides instructions and solicited information

to the user who enters choices on a keypad input device.The kiosk provides

printed information which the user may carry away from the kiosk. Graphic

as well as textual information is dispensed by the kiosk.

2.6 WEB-BASED REAL ESTATE MAPPING SYSTEM

2.7 WEB-BASED REAL ESTATE MAPPING SYSTEM

2.8 WEB-BASED REAL ESTATE MAPPING SYSTEM

2.9 WEB-BASED REAL ESTATE MAPPING SYSTEM

2.10 WEB-BASED REAL ESTATE MAPPING SYSTEM


CHAPTER III

Technical Background

3.1 Technicality of the Project

The proponents had gathered all related research about the project and had

brainstormed about what technologies will be used. As the project is still ongoing,

the proponents will still search for tools and software that can help improve the

development of the system. The PiliPinas: Web Based Mapping is a website

that targets to Map all of the Pili Stores in the Province of Sorsogon. The project

will be an IT related study,so there will be terms or terminologies that only IT

students and persons on the IT field can understand. These are some of the

technical terms that are being used by the proponents in the project: Visual

Studio, HTML, CSS, Server-client, Apache, Php, MySQL, Database, Photoshop,

Bootsrap. Some of the terminologies being stated above are also the technology

being used by the proponents in the project.

3.2 System Requirements


12

Table 3.1. Hardware Requirements


Hardware Requirements
Hardware Minimum Recommended Development
Intel Core i3 or higher
Processor Dual Core Ryzen 5 3400g
AMD a4 or higher
Memory 2.00 GB RAM 4.00 GB RAM or Higher 8 GB RAM DDR4 2666mhz
Hard Disk 120 GB 120 GB or Higher 1 TB
Internet Connection 1 mbps 2mbps or higher 5mbps
Monitor Monitor
Monitor
Mouse Mouse
Peripherals Mouse
Keyboard Keyboard
Keyboard
AVR/UPS AVR
CHAPTER IV

Methodology, Results and Discussion

This chapter presents the system methodology and software development approaches

and techniques used in the conduct of the study.

Figure 4.1. General view of the research’s methodology.

4.1 Project Concepts

PiliPinas is a Web Based Mapping that aims to provide a platform for the user

to quickly locate and less effort on finding the Pili Stores in Sorsogon Province
14

and a platform for the everyone to access but only the Admin or the authorize

personnel can update and maintain the data in an efficient manner. With this

system, the user will not be worry about locating the Pili Stores in the province.

The information of the stores like its name, products and especially location will

be all stored in this system, the user and the personnel will simply browse the

map and then the information about that store will pop up in screen, the location

and other information about, the system makes personnel and user experience

hassle free. As of now most of us is using google maps but the problem with

that is it not solely dedicated on locating the Pili Stores so not all the Pili-stores

in Sorsogon is registered in the system of google maps. So now the researchers

made some improvement that the current system missed out and will be making

some cooperation with the LGUs of the province to make sure they register most

of the stores in the website. They recreate it to be easier, efficient and hassle-free

system.

4.2 System Analysis design approach

Write an overview of this methodology

4.2.1 Requirements Specification

• Functional Requirements
15

– The System aims at providing an efficient interface to the user for

locating Pili Stores in Sorsogon province, it shall also provide the

user varied function when accessing information about the chosen

store. The products of the stores are continuously monitored by their

respected store owners on their usage and are checked for the threshold

levels in the inventory and accordingly the owner is alerted about low

levels of a certain pili products. The design is such that the user does

not have to ask people where are the nearest store and what are there

offered variant of pili products and there availability, the website does

if for the user.

The websites display the location and the quantity of products for the

specific store are pre-set by the store owner(admin), it also displays the

rating of a certain store based on how the previous user or site visitor

rate the quality of the product they sell. Therefore, the user never has

to worry about how good are the certain product is because the website

already has done it for them. The simple interface of the System has

functions like Store Registration, Adding Products, Deleting Products,

Updating Products and Update Store info.

• Nonfunctional requirements
16

– Usability

* The website must be easy to use by both users and owners such

that they do not need to read an extensive amount of manuals.

* The website must be quickly accessible by both users and owners.

* The website must be intuitive and simple in the way it displays all

relevant data and relationships.

* The content of the website must be easily navigable by the users

with buttons that are easy to understand.

– Reliability

* The Website must give accurate status of the products of the store

to the user continuously. Any inaccuracies are taken care by the

regular confirming of the actual quantity by the store owners.

* The website must successfully add, update, delete any product.

* The Website must display the accurate location of a certain store.

* The Website must provide the best store based on their rating.

* The Website must provide a password enabled login to the user to

avoid any foreign entity changing the data in the system.

* The Website should provide the owner updates on completion of

requested processes and if the requested processes fail, it should


17

provide the user the reason for the failure

* The system should not update the data in any database for any

failed processes.

– Performance

* The system must not lag, because the workers using it don’t have

down-time to wait for it to complete an action.

* The system must complete updating the databases, adding of recipe,

ingredient, vendor and occasions successfully every time the user

requests such a process.

* All the functions of the website must be available to the user every

time the system is turned on.

– Supportability

* The software is designed such that it works even on systems having

the minimum configuration.

* The system is adaptable even if additional plugins or modules are

added at a later point.

* The Website must be able to run on any browser may it be Chrome,

Edge, Firefox and etc.

– Implementation
18

* The Website User Interface will be done by using HTML, CSS,

JAVASCRIPT, LEAFLET.JS and BOOTSRAP.

* The connection between the Database and the System is achieved

using XAMPP as the Server and PHP and MySQL as the Language.

* Visual Studio Code will be the Text editor that will be use to

implement the website.

– Interfacing

* The system must offer an easy and simple way of viewing the Store

Location, Products, Ratings and General information.

– Legal

* The software must be legally uploaded to the internet by buying a

genuine domain on godaddy.com

4.2.2 Requirements Analysis Subsection 1

4.3 Development Model

On software development and implementation, the researchers used the System

Development Life Cycle (SDLC) method in the development of the SGRP system.

This method helped the researchers in conducting the study, analysis and design

of the system. It is made up of several phases and the details of these are:
19

Information Gathering, Analysis Phase, Design Phase, Development, Testing,

and Delivery.

• Planning:

– During Planning Stage, the researchers observed the current process

of related and existing systems like Google Maps and Identify what

to improved. The researchers also conducted several observations

and found out that it lacks in features that is important when giving

information about the certain stores like what variation of products it

offers and also anyone can claim that certain store by taking certain

step so it really is disadvantageous for the seller because anyone can

manage the store online. Therefore, we conducted some researches

and plan to foresee the probable solutions to the problems to give the

user more efficient way to browse and locate stores in Sorsogon and

also to promote the store.

• Analysis of the requirement:

– Within this phase, the researchers analyzed the nature of the information

and the functions of the software which are required for the system.

The researchers study all the requirements and try to analyze the

performance of the system which is to be developed. They also made


20

sure that they get enough information and resources for structuring

the suitable system.

• System Design:

– In this third stage of SDLC, functional, support and training requirements

are translated into preliminary and detailed designs. Decisions are

made to address how the system will meet functional requirements. A

preliminary system design, emphasizing the functional features of the

system, is produced as a high-level guide. Then a final system design

is produced that expands the design by specifying all the technical

detail needed to develop the system.

• System Coding:

– During the system coding, the researchers will prepare the codes needed

for the development of the system. The occurrence of change is taking

place. The Coding procedure will be the hardest part of the system

development because it requires a lot of time, effort and patience for

the coder because during this procedure, several errors will occur in

• System Testing:

– In the fifth stage, the researchers are done with the coding stage.
21

Once the system is built testing of the system must take place to

ensure workability and brings all the pieces together into a special

testing environment, then checks for errors, bugs and interoperability.

Any problem that exists will be found and addressed. In this phase,

verification and validation are used.

• System Implementation:

– In this sixth stage of SDLC, this will be the period in which the system

will be installed and supported in the institution. Now the system is

ready for an actual working environment, training is the most important

in this phase.

• System Maintenance:

– In the seventh stage of SDLC, changes, corrections additions are made.

This is the most important step of all and may go on forever.

4.4 Development Approach

4.5 Software Development

The following software applications and languages for Front-end and Back-end

are used for developing the system.


22

• FRONT-END

– Bootstrap

* Bootstrap is a free and open source front end development framework

for the creation of websites and web apps. The Bootstrap framework

is built on HTML, CSS, and JavaScript (JS) to facilitate the development

of responsive, mobile-first sites and apps.

– leaflet

* Leaflet is the leading open-source JavaScript library for mobile-

friendly interactive maps. Weighing just about 39 KB of JS, it has

all the mapping features most developers ever need.

– HTML5

* HTML5 is the latest version of Hypertext Markup Language, the

code that describes web pages. It’s actually three kinds of code:

HTML, which provides the structure; Cascading Style Sheets (CSS),

which take care of presentation; and JavaScript, which makes

things happen.

– CSS

* CSS stands for Cascading Style Sheets describes how HTML elements

are to be displayed on screen, paper, or in other media saves a lot


23

of work. It can control the layout of multiple web pages all at once.

– Javascript

* JavaScript is a scripting or programming language that allows you

to implement complex features on web pages — every time a web

page does more than just sit there and display static information

for you to look at — displaying timely content updates, interactive

maps, animated 2D/3D graphics, scrolling video jukeboxes, etc. —

you can bet that JavaScript is probably involved. It is the third

layer of the layer cake of standard web technologies, two of which

(HTML and CSS) we have covered in much more detail in other

parts of the Learning Area.

• BACK-END

– PHP

* PHP (recursive acronym for PHP: Hypertext Preprocessor) is a

widely-used open source general-purpose scripting language that

is especially suited for web development and can be embedded into

HTML.

– MySql

* A database is a structured collection of data. It may be anything


24

from a simple shopping list to a picture gallery or the vast amounts

of information in a corporate network. To add, access, and process

data stored in a computer database, you need a database management

system such as MySQL Server. Since computers are very good at

handling large amounts of data, database management systems

play a central role in computing, as standalone utilities, or as parts

of other applications.

• Software

– Visual Studio Code (Text-editor)

* Visual Studio Code is a lightweight but powerful source code editor

which runs on your desktop and is available for Windows, macOS

and Linux. It comes with built-in support for JavaScript, TypeScript

and Node.js and has a rich ecosystem of extensions for other languages

(such as C++, C#, Java, Python, PHP, Go) and runtimes (such as

.NET and Unity).

– XAMPP

* XAMPP is an abbreviation for cross-platform, Apache, MySQL,

PHP and Perl, and it allows you to build WordPress site offline, on

a local web server on your computer. This simple and lightweight


25

solution works on Windows, Linux, and Mac – hence the “cross-

platform” part.

– Microsoft Edge

* Microsoft Edge is an internet browser made by Microsoft, which

is installed by default on all new Windows computers. Edge was

made to replace Internet Explorer, and runs faster and with more

features.

4.6 Scheduling and Timeline of the Project

4.7 Implementation Results


BIBLIOGRAPHY

[1] Brgy and municipalities.

[2] Mappingsystem.

[3] The pili nut of bicol.

[4] Nagaraju Bandaru, Eric D Moyer, and Shrisha Radhakrishna. Method and

system for crawling, mapping and extracting information associated with a

business using heuristic and semantic analysis, April 24 2012. US Patent

8,166,013.

[5] David Eraker, Adam Michael Dougherty, Edward M Smith, and Stephen

Eraker. Web-based real estate mapping system, December 15 2015. US

Patent 9,213,461.

[6] Volker Grimm, Gary Polhill, and Julia Touza. Documenting social simulation

models: The odd protocol as a standard. In Simulating Social Complexity,

pages 349–365. Springer, 2017.


APPENDIX A

Elements of the ODD Protocol

Table A.1: The seven elements of the ODD protocol. Description of ABMs are

compiled by answering the questions linked to each element. Adapted from [6].

Overview 1.Purpose What is the purpose of the model?

2. Entities, state variables, scales What kind of entities are in the model? Do they

represent managers, voters, landowners, firms or

something else?

3. Process overview, scheduling What entity does what, in what order? Is the order

imposed or dynamic?

Design Concepts 4. Design concepts

Basic principles Which general concepts, theories or hypotheses are

included in the model’s design?

Emergence What key results are emerging from the adaptive

traits, or behaviors of individuals?

Adaptation What adaptive traits do the individuals have? What

rules do they have for making decisions or changing

behaviour in response to changes in themselves or

their environment?

Objectives If agents (or groups) are explicitly programmed to

meet some objective, what exactly is that and how is it

measured?

Learning May individuals change their adaptive traits over time

as a consequence of their experience? If so, how?

Continued on next page


28

Table A.1 – continued from previous page

Prediction Prediction can be part of decision-making; if an agent’s

learning procedures are based on estimating future

consequences of decisions, how they do this?

Sensing What aspects are individuals assumed to sense and

consider? What aspects of which other entities can an

individual perceive (e.g. displayed ‘signals‘)?

Interaction What kinds of interactions among agents are

assumed? Are there direct interactions where

individuals encounter and affect others, or are

interactions indirect, e.g. via competition for a

mediating resource?

Stochasticity What processes are modelled by assuming they are

random or partly random?

Collectives Do the individuals form or belong to aggregations that

affect, and are affected by, the individuals?

Observation What data are collected from the ABM for testing,

understanding, and analyzing it, and how are they

collected?

Details 5. Initialization What is the initial state of the model world? How

many entities of what type are there initially, and

what are the values of their state variables (or how

were they set)?

6. Input data Does the model use input from external sources such

as data files or other models to represent processes

that change over time?

Continued on next page


29

Table A.1 – continued from previous page

7. Submodels What are the submodels that represent the processes

listed in ‘Process overview and scheduling’?


APPENDIX B

2018 ASONAM Conference Proceedings

2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

Social Network Analysis of a Disaster Behavior


Network: An Agent-Based Modeling Approach
Rey C. Rodrigueza Maria Regina Justina E. Estuar
Ateneo Social Computing Science Laboratory Ateneo Social Computing Science Laboratory
Department of Information Systems and Computer Science Department of Information Systems and Computer Science
Ateneo de Manila University Ateneo de Manila University
1108 Quezon City, Philippines 1108 Quezon City, Philippines
rey.rodrigueza@obf.ateneo.edu restuar@ateneo.edu

Information and Communications Technology Department


Sorsogon State College - Bulan Campus
4706 Bulan, Sorsogon, Philippines

Abstract—Disasters are causing tremendous damage to human exposed to tropical cyclone wind (99%) of which 79% to the
lives and properties. The United Nations International Strategy most dangerous class of hazard [3].
for Disaster Reduction (UNISDR) recognizes that behavioral
Understanding human behavior during disasters could help
change of society is needed to significantly reduce disaster losses.
There is a need therefore in empirical understanding of human in making decisions on how to prepare for disasters and how
behavior during disasters as this could help in making decisions to properly act and strategically respond during and after a
on how to prepare for disasters, how to properly act and calamity. Capturing disaster behavior is of utmost importance
strategically respond during and after a calamity. This study when the needed information is essential to the prediction
aims to understand human behavior during disaster through
and control of populations behavior that is unprotected from
agent-based modeling and social network analysis. eBayanihan,
a disaster management platform that uses crowdsourcing to extreme stress brought by a disaster [4].
gather disaster-related information was used to capture disaster Agent-based modeling (ABM) used to simulate disaster
behavior during a simulated disaster-event. Survey data was also scenarios is not new [5]–[9]. Agent-based modeling is a
used for disaster behavior modeling. Generated disaster behavior simulation technique where a system is modeled as a pool of
models and computed social network centrality measures using
ORA-Netscenes shows that there are specific agents in the
self-governing individuals called agents. Each agent evaluates
network that can play an important role during disaster risk its state and decides based on a given set of rules. Agents
reduction and management (DRRM) operations. behave according to the norms of the environment in which
they belong.
Relationships of people in a disaster-risk area is important
I. I NTRODUCTION when assessing the readiness and resiliency of the community
[10]. Relationships and interactions of individuals in a given
Disasters are exacting an enormous damage to human lives group or area can be studied, assessed and analyzed using So-
and properties in the last decade alone [1]. United Nations cial Network Analysis (SNA). SNA maps and measures formal
International Strategy for Disaster Reduction (UNISDR) ac- and informal relationships to understand what facilitates or
knowledges that behavioral change of society is needed to impedes the knowledge flows that bind interacting units [11].
significantly diminish disaster losses [2]. Major changes in This study attempts to understand disaster behaviors by
attitudes and behaviors towards disaster risk reduction are now using agent-based modeling and social network analysis. This
indicated and elaborated more in all the recent international study is anchored on eBayanihan, a disaster management
agreements [2]. platform that allow crowdsourcing of information from the
public. The eBayanihan users are regarded as actors or agents
For the past two decades, millions of people mostly from
in this study. The interactions and activities of agents are the
countries in Asia and Africa were affected by weather-related
basis for modeling of disaster behaviors. Data matrices in
disasters1 . Among these countries include the Philippines
the form of Agent x Agent, Agent x Knowledge, Agent x
which is the second most affected country next to China
Tasks, and Agent x Belief were prepared from survey data
with the highest absolute number of affected people. The
to be used as input to Organizational Risk Analyzer (ORA)
natural geographic location and physical environment of the
[12], an agent-based modeling and network analyzer tool for
Philippines make it vulnerable to natural disasters. As a matter
of fact, almost all population in the Philippines is potentially 1 https://www.unisdr.org/2015/docs/climatechange/COP21 Weather Disas-
IEEE/ACM ASONAM 2018, August 28-31, 2018, Barcelona, Spain
tersReport 2015 FINAL.pdf
978-1-5386-6051-5/18/$31.00 © 2018 IEEE

1100
31

behavior modeling. Social network analysis was performed using Netlogo [6]. Performing simulations with 1,000 repeti-
on the Agent x Agent network captured from disaster event tions of evacuations using a specified location resulted in a
simulation to compute for the centrality scores of agents. The very high mean of people evacuated. The simulation result
purpose was to determine the important actors in the network. tallied with the recorded evacuation and sheltered evacuees
outcome after the actual event.
II. L ITERATURE R EVIEW A previous study [5] focused on the expected, perceived,
A. Agent-Based Modeling of Human Behaviors during Disas- and actual human behavior during disaster of disaster risk
ter reduction and managment (DRRM) officers from different
government agencies. This study focused on the perceived
Agent-based modeling (ABM) is an approach to evaluate behavior models of ordinary citizens and local government unit
complex systems where independent and interacting agents DRRM officers for the three phases of disaster: before, during
makes up its domain [13]. ABM enables an individual to create and after. This study also incorporates centrality measures to
models where every single element and reciprocal actions are determine important actors in the disaster network.
represented [14]. Moreover, agent-based modeling provides a Though many studies have used ABM for different pur-
mechanism to model social systems comprised of agents that poses, there is less study that used ABM to understand human
influences each other through interactions, acquire knowledge behavior during disasters. This study attempts to analyze
based from their experiences, and adjust their behaviors ac- disaster behavior using agent-based modeling.
cording to their environment. Topologies that are usually used
for depicting social agent interactions includes Soup, Grid
or lattice, Euclidean space, Geographic Information Systems B. Social Network Analysis
(GIS), and Networks [15]. In this study, network topology is Social Network Analysis (SNA) is concerned with under-
used to depict social agent interactions. standing the connections or links (social relations and flows)
Agent-based modeling has numerous applications in mea- among social entities (”actors”) which could be people, groups
suring and understanding human behavior. For example, an organizations, computers or other knowledge/information pro-
ABM of flood incident management (FIM) was developed to cessing entities, and the significance and consequences of these
provide new insights about flood management which could aid connections [17], [18]. Patterns in social network analysis
in policy analysis [8]. The multi-agent simulation combined could reveal group of actors that are coordinated into cohesive
with a hydrodynamic model approximated individuals suscep- social groups. Moreover, these patterns could also disclose
tibility to flooding. After testing the methods in a specific group of actors with identical social roles or positions [19].
location, results showed that the model can be used to assess SNA applications can be found in different domains. Some
the effectiveness of flood management measures [8]. In another of the most recent studies that implemented SNA is listed in
study, utilization of pedestrian lanes during crowd evacuation Table I.
was modeled using agent-based modeling where the focus was
on discovering which pedestrian lanes can be easily recognized TABLE I
during a disaster [9]. Lanes which had a higher probability to RECENT STUDIES THAT IMPLEMENTED SNA
be overcrowded and lanes that are less likely to be traversed
Topic Domain Reference
by individuals during a disaster were identified using the Understanding terrorism [20]
collected data. The information gathered was used to make Evaluating students performance [21]
lanes visible and to distribute crowd traffic to those lanes thus Role of social media in a disaster [22]
Online extremism [23]
preventing overcrowding in some lanes during evacuation. In Information security [24]
both instances, data collected from human movement were
used to improve on management of complex events during
disasters.
Anchoring on the UNs cluster approach on information- C. Centrality Measures
processing, one study used agent-based modeling and sim-
ulation to demonstrate that properly used clusters promotes Social network centrality measures determines the most
faster flow of information resulting in a timely and successful important nodes in a social network. Important nodes are those
response to disasters [16]. Results showed that humanitarian nodes who are popular, highly influential, highly connected,
response is immediately prompted if cluster leads will act as and could control the flow of information in the network.
information hub and if information is shared eagerly. The study A decision maker during disasters could use these centrality
also showed that the higher the quality of information, the measures to determine individuals who could be instrumental
faster it moves, which is essential for effective resource uti- in carrying out successful disaster management activities such
lization. ABM was also used in several studies that focused on as disaster mitigation, preparedness, response and recovery by
human behavior during earthquake and tsunami. In one study, utilizing their influence or connections to other individuals.
an evacuation model coupled with a numerical simulation of a The following centrality measures identifies individuals’ posi-
tsunami and estimation evaluation of casualties was developed tions within a network.

1101
32

1) Total Degree Centrality: The total degree centrality several barangays, the smallest administrative division in the
depicts the number of neighbors or adjacent connections an Philippines, which form their own Barangay Disaster Risk
actor has. The higher the number, the more direct collaborators Reduction and Management Committee (BDRRMC).
the actor has in the known network [25]. The degree centrality
E. eBayanihan: A Disaster Management Platform for Captur-
is defined as
Xn ing Human Behavior During Disaster
CD (vi ) = di = Aij . (1) eBayanihan3 [5], a free online Disaster Management Sys-
j=1
tem, uses crowdsourcing to collect disaster-related information
where A is the adjacency matrix of a network and di is the from its users. With eBayanihan, a registered user (citizen) can
degree of node vi (di = |Ni |). The value of Aij is 1 if an edge post disaster-related information (citizen report) and this post
exists between nodes vi and vj ; 0 otherwise. can be seen by other eBayanihan users in their timeline. A
2) Betweenness Centrality: The betweenness centrality of user can also comment/respond on the post/report by other
node in a network is defined as the number of geodesic paths users. A comment could either be a question about the report,
that pass through a node [26]. High betweenness centrality a validation about the report, an inquiry which may be related
signify that a node or an actor is a valuable mediator in the to the report, or just a personal statement by the commenter
communication network. The betweenness centrality of a node [5]. The more users confirming the validity of the report, the
is defined as more reliable the report is.
X σst (vi )
CB (vi ) = . (2) III. M ETHODOLOGY
σst
vs 6=vi 6=vt ∈V,s<t A. Agent-Based Modeling of Disaster Behavior
where σst is the total number of shortest paths between In this study, agents or actors are represented by users of
nodes vs and vt , and σst (vi ) is the number of shortest paths eBayanihan which belongs to different clusters. These includes
between nodes vs and vt that passes along node vi . church leaders, public high school and grade school teachers,
3) Closeness Centrality: Closeness centrality is the average barangay officials, Local Government Unit (LGU) staff, and
closeness of a node to the other nodes in a network. This Municipal Disaster Risk Reduction and Management Office
measure shows how close the person is to all the other (MDRRMO) officer and staff which were invited to participate
members of the network through both direct and indirect paths in the eBayanihan training and simulation of disaster event that
[25]. The closeness centrality is defined as the node’s inverse was conducted on January 27, 2017 at La Union province,
average distance, Philippines. There were a total of 23 participants during the
 −1 eBayanihan training which comprised of 11 public teachers,
1 X
n
n−1 7 barangay (community) officials, 3 church leaders, and two
Cc (vi ) =  g(vi , vj ) = Pn . (3) LGU staff.
n−1 j6=1 g(vi , vv )
j6=i Before the training, a survey was first conducted using a
where n is the number of nodes, and g(vi , vj ) denotes the questionnaire. Table II lists the five disaster-related questions
geodesic distance between nodes vi and vj . across the three phases of disaster (pre, during, and post
4) Eigenvector Centrality: Eigenvector centrality calculates disaster), and the network captured from the responses of par-
the principal eigenvector of the network and it is calculated on ticipants or agents. These questions are intended for capturing
agent by agent matrices [27]. A node is high in eigenvector the perceived behavior of agents during a disaster.
centrality if it is connected to many other nodes who are
themselves well connected [27]. The eigenvector centrality is TABLE II
S URVEY QUESTIONS AND NETWORKS CREATED BASED FROM RESPONSES
given by X
CE (vi ) α Aij CE (vj ). (4) Questions Network Captured
Who do you work with? Agent x Agent
vj ∈Ni
What tasks are assigned to you? Agent x Task
D. Disaster Risk Reduction and Management (DRRM) Orga- What skills and knowledge that you
possess you think could help you in
nization Structure in the Philippines performing the tasks assigned to you? Agent x Knowledge
Disaster and emergency events in the Philippines are man- What are the things or factors that
you believe
aged using a decentralized approach. At the regional and na- (a) could help you survive a disaster event? Agent x Belief (+)
tional level, the Office of Civil Defense (OCD) has formed the (b) are hindrance in disaster preparation,
National Disaster Risk Reduction and Management Council rescue, and recovery? Agent x Belief (-)
(NDRRMC) 2 . At the provincial level, the elected Governor
For each question, a network was created by aggregating
provides a team under the Provincial Disaster Risk Reduc-
the responses and getting the central themes. A binary matrix
tion and Management Council (PDRRMC). At the municipal
is used to model a network. In a matrix, row labels are the
level, Local Government Units (LGUs) led by the elected
Mayor forms its own Municipal Disaster Risk Reduction 2 http://www.ndrrmc.gov.ph

and Management Council (MDRRMC). Each municipality has 3 http://ebayanihan.ateneo.edu

1102
33

names of the agents and the column labels are the themes computed. Also, using ORA, network graphs were produced
from the aggregated responses. Matrix cell entries was based where nodes are sized and colored according to their centrality
from the intersections of rows and columns. In an Agent x scores. The higher the value of centrality score, the larger the
Agent matrix, for example, interaction between two agents node. Also, if the node of interest has a higher than normal
is represented by a value of 1 in their intersection cell, value (greater than 1 standard deviation(s) above the mean),
otherwise the value is 0. The same process was applied to the node is colored red. The node is green if the node is within
other types of network. A total of 15 matrices created based 1 standard deviation of the mean. Finally, the node is colored
from the responses to questions were fed into ORA-Netscenes blue if the node has a lower than normal value (less than one
to generate the perceived behavior models before, during and standard deviation(s) below the mean). Nodes with centrality
after a disaster. The generated perceived behavior models for values less than the red nodes but greater than the blue nodes
the three disaster phase for each network were compared and were colored orange, and nodes with values between orange
analyzed. and blue nodes were colored yellow. The networks generated
were presented as directed graphs.
B. Social Network Analysis of Disaster Behavior from Simu-
lated Disaster Event IV. R ESULTS AND D ISCUSSIONS
The participants in a disaster-event simulation were grouped
A. Perceived Behavior Models
according to their prescribed duties and responsibilities during
disasters. At the start of the simulation, a disaster situation was The models generated are in the form of undirected graphs.
given as a report in eBayanihan, and the participants engaged Figure 1, shows the perceived Agent x Agent behavior models
in the interactions by asking more details about the situation before, during, and after a disaster. Before a disaster, Public
or by responding to the situation, thus forming a social Teachers and Church Leaders prepare and work with their
network. During this event, their activities and interactions family and coworkers. Barangay officials work with their
using eBayanihan were captured and stored in a PostgreSQL constituents, while MDRRMO and LGU staff prepare and
database. Two tables contains the citizen reports and responses work together. During a disaster, most agents center their
to reports respectively. The database rows from the two tables attention to and work closely with the members of their
are queried and saved into a single comma-separated value family. This supports the fact that family members ensure first
(CSV) file. There are 110 unique records in the created dataset. that each one of them are safe especially before joining any
Posts without responses or comments are ignored during the emergency evacuation. MDRRMO and LGU staffs remain in
database query. Table III describes the attributes of the dataset contact with each other throughout the three disaster phases.
extracted from the eBayanihan database tables cit report and The agents work with the same group of people during and
comments. after a disaster.

TABLE III
C ITIZEN R EPORTS AND R ESPONSES L OGS IN E BAYANIHAN

Attributes Description
cit report id Unique identifier for the citizen report
web user id Unique identifier for the eBayanihan user
web user role The DRRM role of the eBayanihan user
responder user id The web user id of report responder
responder user role The DRRM role of the report responder

In able to perform SNA in ORA-Netscenes, the dataset was


transformed into a binary matrix and saved in a CSV file.
The row and column labels of the matrix are the eBayanihan
user’s id (web user id \responder user id) concatenated with
their role (e.g. 1771 ORDINARY CITIZEN). Row labels
refers to eBayanihan users who posted a report while the
column labels refers to those users who responded. The value
of a cell in the matrix is set to 1 if the eBayanihan user
in row and the eBayanihan user in column had interacted,
otherwise it is set to 0. This process was performed using
a Python script and resulted into a 27 x 27 binary matrix
that was fed into ORA-Netscenes. Social network analysis Fig. 1. Perceived Agent x Agent Behavior Models
was performed to compute the individual scores of each agent
for the following centrality measures: total degree, closeness, Figure 2 displays the perceived Agent x Task models. It
eigenvector, and betweenness centrality. Standard deviations, can be seen that the tasks identified by agents all throughout
mean, and maximum scores for centrality measures were the phases of disaster operations are in consonance with their

1103
34

duties and responsibilities as members or leaders of their


respective units. This indicates that the agents are properly
oriented on what they should do in case of disaster. The
tasks are also in agreement with each phase of disaster
operations. Before a disaster, some agents have similar tasks
which focuses on disaster preparation. During a disaster, there
was an increase in tasks particularly with Public Teachers
which includes ensuring the safety of their family. Also,
tasks determined by agents in this phase are for rescue and
evacuation in which some tasks are shared by some agents. For
example, rescue operations are both duties of LGU staffs and
Barangay Officials during a disaster. Reporting of incidents
or devastations to higher authorities is the most common task
after a disaster. It is also notable that most agents perform
tasks that are unique to them.

Fig. 3. Perceived Agent x Knowledge Models

agents believe that complete equipment is needed before a


disaster to survive. Moreover, the model for the agents beliefs
during a disaster shows that working as a coordinated group,
cooperation, knowledge and well identified duties during dis-
asters are essential factors for survival. Lastly, being steadfast
contributes for a positive outlook after a disaster. These beliefs
serve as guide to people when dealing with disasters. It would
be desirable if beliefs with positive perspective are shared by
more people.
Fig. 2. Perceived Agent x Task Models
Identifying and addressing the factors that negatively affects
the DRRM operations during disasters could save lives and
The perceived Agent x Knowledge models are shown in properties. As displayed in Figure 5, it can be observed that
Figure 3. The models shows that agents are consistent in their the agents identified lack of equipment and instability of
use of technology during disasters. However, only one agent, technologies during the course of a disaster negatively affects
the Public Teachers, indicated knowledge about earthquake preparation, rescue and recovery. Further and most notably, it
and fire drills and disaster preparedness. Also, life-saving is the indifference of people to the situation that greatly affects
knowledge and skills like administering first-aid, swimming the outcome of disaster operations. Individual behavior during
skills and the like are lacking on most of the agents. On the disaster is crucial in assessing the outcome after a disaster.
other hand, one agent, the Church Leaders, have indicated the Undesirable behavior of people should be changed in order to
required skills and knowledge that are expected from them. mitigate the effects of disaster.
Knowing what could help in surviving a disaster is vital.
Life-saving information or knowledge is crucial during critical B. Social Network Analysis
situations. Figure 4 illustrates the perceived Agent x Belief The social network analysis performed on the dataset fo-
model for positive factors in surviving a disaster event. Most cused on centrality measures to identify important agents in the

1104
35

Fig. 4. Perceived Agent x Belief Models - Positive Factors Fig. 5. Perceived Agent x Belief Models - Negative Factors

social network. The graphs that illustrates centrality measures and request for volunteers during disaster preparedness. Addi-
scores are represented by directed graphs to show which agents tionally, this agent could have an access to more information
initiated the interactions. about what is happening during disaster through his numerous
Table IV shows the standard deviations, means, and max- connections. This is vital when more information is needed to
imum scores for centrality measures and Table V shows the make a decision during crucial times. Other agents with high
top 3 scoring nodes side-by-side for selected measures. total degree centrality scores could also be considered for the
same purpose, such as agents 1245 OFFICIAL VOLUNTEER
TABLE IV and 1825 ORDINARY CITIZEN.
S TANDARD DEVIATION , MEAN , AND MAXIMUM SCORES FOR EACH
CENTRALITY MEASURES

Centrality Measures Maximum Mean Standard Deviation


Total Degree 0.423 0.078 0.089
Closeness 0.095 0.064 0.023
Betweenness 0.283 0.017 0.055
Eigenvector 0.628 0.202 0.167

Figure 6 displays the network graph for total degree central-


ity where sizes and colors of nodes (agent) are based on their
centrality scores. With a score of 0.423 (see Table IV), the
actor 28 MDRRMO has the most direct links to other actors,
which is almost half of the total number of agents in the
network. This result validates the extent of influence of agent Fig. 6. Network diagram where nodes are sized and colored according to
28 MDRRMO which is an actual DDRM officer. This agent Total Degree centrality scores.
is important as he could bring immediate influence or impact
to others, such as in the case of information dissemination Agent network for closeness centrality is shown in Figure

1105
36

TABLE V
C ENTRALITY M EASURES : K EY N ODES TABLE

Rank Total Degree Centrality Closeness Centrality Betweenness Centrality Eigenvector Centrality
1 28 MDRRMO 1771 ORDINARY 28 MDRRMO 28 MDRRMO
CITIZEN
2 1245 OFFICIAL VOLUN- 1827 ORDINARY 1245 OFFICIAL VOLUN- 1245 OFFICIAL VOLUN-
TEER CITIZEN TEER TEER
3 1825 ORDINARY 1759 MDRRMO 1824 ORDINARY 562 ORDINARY
CITIZEN CITIZEN CITIZEN

7. The agent with the most significant closeness centrality


score is the largest node with a red color, that is, agent
1771 ORDINARY CITIZEN. Agent 1771 ORDINARY CITI-
ZEN requires only few intermediaries for contacting others.
This agent, which has the shortest paths to all others in the
network, together with other agents listed in Table V are
well positioned to receive new information early when it has
the most value. They could be tapped as a source of novel
information regarding disaster events or accidents.

Fig. 8. Network diagram where nodes are sized and colored according to
Eigenvector centrality scores.

scores are 28 MDRRMO, 1245 OFFICIAL VOLUNTEER and


1824 ORDINARY CITIZEN. These agents could be a valuable
mediators in the eBayanihan communication network. They
could also act as bridges between users of eBayanihan that
are not yet communicating through the platform. Maintaining
and improving communication between people during dis-
asters through a disaster management system is vital when
Fig. 7. Network diagram where nodes are sized and colored according to
Closeness centrality scores.
conducting disaster risk reduction and management activities.
The more communication links in the network, the more robust
Individuals with high eigenvector centrality scores are those it is and the more effective and efficient the operations will
who are connected to other individuals who are also high be.
scorers. These persons are regarded as the most influential The perceived behavior models in this study can be used
nodes in the network. Figure 8 reveals those agents who have to aid the identified important agents in the disaster behavior
high eigenvector centrality scores based on their node size network in reducing disaster losses by knowing the specific
and colors. The agent with the highest eigenvector centrality immediate network, tasks, knowledges and beliefs of other
score (0.628) is 28 MDRRMO, followed by 1245 OFFICIAL agents and connecting with those who have potential to
VOLUNTEER and 562 ORDINARY CITIZEN. In the disaster strengthen the collaborative network and informing specific
risk reduction and management context, their influence could agents about the required knowledge and skills in able to
include influencing attitudes in using a disaster management survive a disaster.
system like eBayanihan. Their consistent presence in the
interaction network could encourage others to also maintain V. C ONCLUSION
their presence in the network thus maintaining or improving This work contributes findings in understanding human
the communication between agents. Moreover, their strong behavior during disaster by constructing perceived behavior
connection with other agents could make the entire network models on an Agent x Agent, Agent x Knowledge, Agent x
function effectively. Task, and Agent x Belief networks across the three phases of
Betweenness centrality measures how much information disaster. Also, by using SNA, important agents were identified
will pass through a certain node. If an individual has a high from a disaster behavior network formed through disaster
betweenness score, then that individual could have a control event simulation utilizing a disaster management platform.
over information that flows between other individuals. Figure Perceived behavior models show that agents works with those
9 shows the network depicting betweenness centrality scores whom they are close to during disaster and they perform
of agents. Top three agents with high betweenness centrality tasks according to their role in the community. However,

1106
37

[11] O. Serrat, “Social network analysis,” in Knowledge solutions. Springer,


2017, pp. 39–43.
[12] N. Altman, K. Carley, and J. Reminga, “Ora user’s guide 2017,”
Carnegie-Mellon Univ. Pittsburgh PA Inst of Software Research Inter-
national, Tech. Rep., 2017.
[13] C. M. Macal and M. J. North, “Tutorial on agent-based modeling and
simulation,” in Simulation Conference, 2005 Proceedings of the Winter.
IEEE, 2005, pp. 14–pp.
[14] N. Gilbert, Agent-based models, ser. 07. Sage, 2008, no. 153.
[15] C. Macal and M. North, “Introductory tutorial: Agent-based modeling
and simulation,” in Proceedings of the 2014 Winter Simulation Confer-
ence. IEEE Press, 2014, pp. 6–20.
[16] N. Altay and R. Pal, “Information diffusion among agents: implications
for humanitarian operations,” Production and Operations Management,
Fig. 9. Network diagram where nodes are sized and colored according to vol. 23, no. 6, pp. 1015–1027, 2014.
Betweenness centrality scores. [17] S. Wasserman and K. Faust, Social network analysis: Methods and
applications. Cambridge university press, 1994, vol. 8.
[18] D. Hansen, B. Shneiderman, and M. A. Smith, Analyzing social media
networks with NodeXL: Insights from a connected world. Morgan
behavior models also show that some agents do not possess Kaufmann, 2011.
the knowledge and skills needed to survive a disaster. So- [19] L. C. Freeman, “Graphic techniques for exploring social network data,”
Models and methods in social network analysis, pp. 248–269, 2005.
cial network analysis reveals agents that are central to the [20] R. Yarlagadda, D. Felmlee, D. Verma, and S. Gartner, “Implicit terrorist
disaster behavior network and these agents could provide the networks: A two-mode social network analysis of terrorism in india,”
necessary control and influence to improve and strengthen the in International Conference on Social Computing, Behavioral-Cultural
Modeling and Prediction and Behavior Representation in Modeling and
communication, coordination and collaboration among agents Simulation. Springer, 2018, pp. 340–347.
during disaster. One limitation of this study is the small size [21] L. J. Khalil and M. G. Khair, “Social network analysis: friendship
of dataset. Increasing the dataset size could better demonstrate inferred by chosen courses, commuting time and student performance
at university,” International Journal of Reasoning-based Intelligent
the effectiveness of the proposed methods. Systems, vol. 10, no. 1, pp. 59–67, 2018.
[22] J. Kim and M. Hastak, “Social network analysis: Characteristics of
ACKNOWLEDGMENT online social networks after a disaster,” International Journal of Infor-
mation Management, vol. 38, no. 1, pp. 86–96, 2018.
The authors would like to thank John Noel C. Victorino, the [23] M. C. Benigni, K. Joseph, and K. M. Carley, “Online extremism and the
Ateneo Java Wireless Competency Center and Ateneo Social communities that sustain it: Detecting the isis supporting community on
twitter,” PloS one, vol. 12, no. 12, p. e0181405, 2017.
Computing Science Laboratory. [24] L. Kirichenko, T. Radivilova, and A. Carlsson, “Detecting cyber
threats through social network analysis: short survey,” arXiv preprint
R EFERENCES arXiv:1805.06680, 2018.
[25] S. J. Strang, “Network analysis in criminal intelligence,” in Networks
[1] UNISDR, “Global assessment report on disaster risk reduction mak- and network analysis for defence and security. Springer, 2014, pp.
ing development sustainable: the future of disaster risk management,” 1–26.
Geneva, Switzerland: UNISDR, Tech. Rep., 2015. [26] L. C. Freeman, Research methods in social network analysis. Rout-
[2] ——, “Strategic framework 2016 - 2021,” Geneva, Switzerland: ledge, 2017.
UNISDR, Tech. Rep., 2016. [27] I. McCulloh, H. Armstrong, and A. Johnson, Social network analysis
[3] M. Pesaresi, D. Ehrlich, T. Kemper, A. Siragusa, A. J. Florczyk, with applications. John Wiley & Sons, 2013.
S. Freire, and C. Corbane, “Atlas of the human planet 2017,” 2017.
[4] C. E. Fritz and E. S. Marks, “The norc studies of human behavior in
disaster,” Journal of Social Issues, vol. 10, no. 3, pp. 26–41, 1954.
[5] M. R. J. Estuar, R. C. Rodrigueza, J. N. C. Victorino, M. C. V. Sevilla,
M. M. De Leon, and J. C. S. Rosales, “Agent-based modeling approach
in understanding behavior during disasters: Measuring response and
rescue in ebayanihan disaster management platform,” in Social, Cultural,
and Behavioral Modeling: 10th International Conference, SBP-BRiMS
2017, Washington, DC, USA, July 5-8, 2017, Proceedings, vol. 10354.
Springer, 2017, p. 46.
[6] E. Mas, A. Suppasri, F. Imamura, and S. Koshimura, “Agent-based
simulation of the 2011 great east japan earthquake/tsunami evacuation:
An integrated model of tsunami inundation and evacuation,” Journal of
Natural Disaster Science, vol. 34, no. 1, pp. 41–57, 2012.
[7] N. Wagner and V. Agrawal, “An agent-based simulation system for
concert venue crowd evacuation modeling in the presence of a fire
disaster,” Expert Systems with Applications, vol. 41, no. 6, pp. 2807–
2815, 2014.
[8] R. J. Dawson, R. Peppe, and M. Wang, “An agent-based model for risk-
based flood incident management,” Natural hazards, vol. 59, no. 1, pp.
167–189, 2011.
[9] L. Wu and H. Lin, “A personalized spatial cognitive road network for
agent-based modeling of pedestrian evacuation simulation: A case study
in hong kong,” Annals of GIS, vol. 18, no. 2, pp. 109–119, 2012.
[10] T. Alcayna, V. Bollettino, P. Dy, and P. Vinck, “Resilience and disaster
trends in the philippines: opportunities for national and local capacity
building,” PLoS currents, vol. 8, 2016.

1107
APPENDIX C

Geocoded XML of “Metro Manila” using Google Maps Geocode API

<GeocodeResponse>
<status>OK</status>
<result>
<type>administrative_area_level_1</type>
<type>political</type>
<formatted_address>Metro Manila, Philippines</formatted_address>
<address_component>
<long_name>Metro Manila</long_name>
<short_name>NCR</short_name>
<type>administrative_area_level_1</type>
<type>political</type>
</address_component>
<address_component>
<long_name>Philippines</long_name>
<short_name>PH</short_name>
<type>country</type>
<type>political</type>
</address_component>
<geometry>
<location>
<lat>14.6090537</lat>
<lng>121.0222565</lng>
</location>
<location_type>APPROXIMATE</location_type>
<viewport>
<southwest>
<lat>14.3493861</lat>
<lng>120.9172569</lng>
</southwest>
<northeast>
<lat>14.7812170</lat>
<lng>121.1320120</lng>
</northeast>
</viewport>
<bounds>
<southwest>
<lat>14.3493861</lat>
<lng>120.9172569</lng>
</southwest>
<northeast>
<lat>14.7812170</lat>
<lng>121.1320120</lng>
</northeast>
</bounds>
</geometry>
<partial_match>true</partial_match>
<place_id>ChIJbTgmYNLIlzMR0HiSrNoj7V8</place_id>
</result>
</GeocodeResponse>

You might also like